Author: Corey Neskey, CISSP | | https://github.com/cneskey | https://linkedin.com/in/cneskey | @cneskey

Analysis

Overview


Scope

Scope Table
Assets at risk
Containers/Points of attack
Threat communities
Threat Types
Effects
Included Excluded Included Excluded Included Excluded Included Excluded Included Excluded
Non Public Information (NPI) Other Subnet Neighbors on Oak-Net DerpCorp AD Systems privileged insiders (DerpCorp & Vendors) non-privileged insiders (DerpCorp & Vendors) deliberately Mechanical confidentiality integrity
ServerGaugeMgmt Server on Oak-Net DerpCorp SMTP Systems malicious software Process Failure availability
ServerGaugeReport Server on Oak-Net DerpCorp Networking and FW Systems external attackers Natural
ServerGaugeIndex Server on Oak-Net DerpCorp Vulnerability Scanner Systems accidentally
ServerGaugeMonitor Server on Oak-Net DerpCorp Vendor Access
ServerGaugeSQL Server on Oak-Net DerpCorp Replicated DR Equivalent Systems
DerpCorp hypervisor Server on Oak-Net DerpCorp Backup Systems
DerpCorp sysadmin jump stations on Oak-Net DerpCorp DFS Systems
Monitored servers on Maple-Net DerpCorp Endpoint Security Management Server
Monitored servers on Birch-Net DerpCorp Endpoint Management Server

Areas were excluded as was considered reasonable and appropriate with the resources provided and time constraints set but do make up the larger system of supporting technologies. The subnet chosen formost components is Derp Corp’s subnet called “Oak-Net”.

Projection The net value after factoring in costs, benefits, losses, and mitigation costs over 1 year, 2 year, and 3 years.

Plan A Expected

Year 1 Year 2 Year 3
Benefits $359,930 $719,860 $1,079,789
Costs $54,532 $57,403 $60,274
Loss $575,430 $1,150,860 $1,726,291
Mitigation Costs $0 $0 $0
Prevented Loss $0 $0 $0
Net -$270,032 -$845,462 -$1,420,892

Plan B Expected

Year 1 Year 2 Year 3
Benefits $359,930 $719,860 $1,079,789
Costs $54,532 $57,403 $60,274
Loss $272,684 $545,367 $818,051
Mitigation Costs $3,543 $3,543 $3,543
Prevented Loss $302,747 $605,493 $908,240
Net $331,918 $361,981 -$516,196

Plan C Expected

Year 1 Year 2 Year 3
Benefits $359,930 $719,860 $1,079,789
Costs $54,532 $57,403 $60,274
Loss $176,594 $353,188 $529,782
Mitigation Costs $60,456 $60,456 $60,456
Prevented Loss $398,836 $797,673 $1,196,509
Net $467,184 $689,427 -$573,109

***

Given the net value after factoring in known initial and recurring costs of this project as well as the project’s known benefits, potential losses due to risks, and control mitigation costs, Derp Corp can expect to realize profit after 2 years of use of this solution provided plan B controls are implemented.

Benefits Parameters provided by experts to approximate benefits of this project

Benefits Table
Benefit UID Benefit Event Benefits Probability Benefits Lower Bound Benefits Most Likely Benefits Upper Bound Benefits Rationale Benefits Recurring_Ben
benefit-1 System performance monitoring and alerting to prevent outages where possible and reduce outage duration. 90% $63,477 $182,292 $1,718,750 LowEnd = .5 hrs of outages for 2k employees making 75k+30%bens, MostLikely = 1 hrs of outages 1.5k emps making 100k+30%bens, HighEnd = 4 hrs outages 3k emps making 300k+30%bens, TRUE
benefit-2 Remote command execution via performance agent. 50% $30 $2,000 $200,000 Assumes Upper Bound is cost of one FTE. Not part of original use-case but may be used. TRUE

The benefits of this project take the form of prevented outages and reduction of outage events. The value is estimated based on the wages of personnel who would be unable to work due to an outage that this solution would prevent but who would still be paid according to their normal work hours. A potential benefit also factored in is prospective use of the solution’s alternative functionality of remote system control. This has the potential to save systems administrators time though it is uncertain so is given a probability of providing value of 50% per year.

Costs Parameters provided by experts to approximate the costs of this project.

Costs Table
Known Costs UID Known Cost Event Known Costs Lower Bound Known Costs Most Likely Known Costs Upper Bound Known Costs Rationale Known Costs Recurring Expense
cost-1 Product (ServerGauge) direct purchase costs $19,790 $19,790 $19,790 Actual Contract FALSE
cost-2 Product (ServerGauge) support and pro services $0 $0 $0 No Pro Services FALSE
cost-3 Internal setup and testing $1,500 $24,000 $72,000 Wage-based - Sys Engineer x 2 - 1-12 week, ML 4 weeks FALSE
cost-4 Internal initial security review $1,500 $2,800 $5,600 Wage-based - Security Analyst x 1 FALSE
cost-5 Ongoing maintenance and systems administration $1,500 $3,000 $4,000 Wage-based - Sys Engineer x 1 - 1 to 8 weeks ML 2 TRUE

Costs include product purchase costs based on the quote provided by the vendor as well as the system administrator wage plus benefits times the estimated hours required to test and implement the product. The same wage and benefit calculation is used for ongoing systems administration maintenance of the product and review by security analysts.

Scenarios

Scenarios Table
UID Assets at risk Containers/Points of attack Threat communities Threat Types Effects Scenario
Risk-1 Non Public Information (NPI) Subnet Neighbors on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately confidentiality privileged insiders (DerpCorp & Vendors) deliberately impact the confidentiality of Non Public Information (NPI) through Subnet Neighbors on Oak-Net.
Risk-2 Non Public Information (NPI) ServerGaugeMgmt Server on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately confidentiality privileged insiders (DerpCorp & Vendors) deliberately impact the confidentiality of Non Public Information (NPI) through ServerGaugeMgmt Server on Oak-Net.
Risk-3 Non Public Information (NPI) ServerGaugeReport Server on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately confidentiality privileged insiders (DerpCorp & Vendors) deliberately impact the confidentiality of Non Public Information (NPI) through ServerGaugeReport Server on Oak-Net.
Risk-4 Non Public Information (NPI) ServerGaugeIndex Server on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately confidentiality privileged insiders (DerpCorp & Vendors) deliberately impact the confidentiality of Non Public Information (NPI) through ServerGaugeIndex Server on Oak-Net.
Risk-5 Non Public Information (NPI) ServerGaugeMonitor Server on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately confidentiality privileged insiders (DerpCorp & Vendors) deliberately impact the confidentiality of Non Public Information (NPI) through ServerGaugeMonitor Server on Oak-Net.
Risk-6 Non Public Information (NPI) ServerGaugeSQL Server on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately confidentiality privileged insiders (DerpCorp & Vendors) deliberately impact the confidentiality of Non Public Information (NPI) through ServerGaugeSQL Server on Oak-Net.
Risk-7 Non Public Information (NPI) DerpCorp hypervisor Server on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately confidentiality privileged insiders (DerpCorp & Vendors) deliberately impact the confidentiality of Non Public Information (NPI) through DerpCorp hypervisor Server on Oak-Net.
Risk-8 Non Public Information (NPI) DerpCorp sysadmin jump stations on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately confidentiality privileged insiders (DerpCorp & Vendors) deliberately impact the confidentiality of Non Public Information (NPI) through DerpCorp sysadmin jump stations on Oak-Net.
Risk-9 Non Public Information (NPI) Monitored servers on Maple-Net privileged insiders (DerpCorp & Vendors) deliberately confidentiality privileged insiders (DerpCorp & Vendors) deliberately impact the confidentiality of Non Public Information (NPI) through Monitored servers on Maple-Net.
Risk-10 Non Public Information (NPI) Monitored servers on Birch-Net privileged insiders (DerpCorp & Vendors) deliberately confidentiality privileged insiders (DerpCorp & Vendors) deliberately impact the confidentiality of Non Public Information (NPI) through Monitored servers on Birch-Net.
Risk-11 Non Public Information (NPI) Subnet Neighbors on Oak-Net malicious software deliberately confidentiality malicious software deliberately impact the confidentiality of Non Public Information (NPI) through Subnet Neighbors on Oak-Net.
Risk-12 Non Public Information (NPI) ServerGaugeMgmt Server on Oak-Net malicious software deliberately confidentiality malicious software deliberately impact the confidentiality of Non Public Information (NPI) through ServerGaugeMgmt Server on Oak-Net.
Risk-13 Non Public Information (NPI) ServerGaugeReport Server on Oak-Net malicious software deliberately confidentiality malicious software deliberately impact the confidentiality of Non Public Information (NPI) through ServerGaugeReport Server on Oak-Net.
Risk-14 Non Public Information (NPI) ServerGaugeIndex Server on Oak-Net malicious software deliberately confidentiality malicious software deliberately impact the confidentiality of Non Public Information (NPI) through ServerGaugeIndex Server on Oak-Net.
Risk-15 Non Public Information (NPI) ServerGaugeMonitor Server on Oak-Net malicious software deliberately confidentiality malicious software deliberately impact the confidentiality of Non Public Information (NPI) through ServerGaugeMonitor Server on Oak-Net.
Risk-16 Non Public Information (NPI) ServerGaugeSQL Server on Oak-Net malicious software deliberately confidentiality malicious software deliberately impact the confidentiality of Non Public Information (NPI) through ServerGaugeSQL Server on Oak-Net.
Risk-17 Non Public Information (NPI) DerpCorp hypervisor Server on Oak-Net malicious software deliberately confidentiality malicious software deliberately impact the confidentiality of Non Public Information (NPI) through DerpCorp hypervisor Server on Oak-Net.
Risk-18 Non Public Information (NPI) DerpCorp sysadmin jump stations on Oak-Net malicious software deliberately confidentiality malicious software deliberately impact the confidentiality of Non Public Information (NPI) through DerpCorp sysadmin jump stations on Oak-Net.
Risk-19 Non Public Information (NPI) Monitored servers on Maple-Net malicious software deliberately confidentiality malicious software deliberately impact the confidentiality of Non Public Information (NPI) through Monitored servers on Maple-Net.
Risk-20 Non Public Information (NPI) Monitored servers on Birch-Net malicious software deliberately confidentiality malicious software deliberately impact the confidentiality of Non Public Information (NPI) through Monitored servers on Birch-Net.
Risk-21 Non Public Information (NPI) Subnet Neighbors on Oak-Net external attackers deliberately confidentiality external attackers deliberately impact the confidentiality of Non Public Information (NPI) through Subnet Neighbors on Oak-Net.
Risk-22 Non Public Information (NPI) ServerGaugeMgmt Server on Oak-Net external attackers deliberately confidentiality external attackers deliberately impact the confidentiality of Non Public Information (NPI) through ServerGaugeMgmt Server on Oak-Net.
Risk-23 Non Public Information (NPI) ServerGaugeReport Server on Oak-Net external attackers deliberately confidentiality external attackers deliberately impact the confidentiality of Non Public Information (NPI) through ServerGaugeReport Server on Oak-Net.
Risk-24 Non Public Information (NPI) ServerGaugeIndex Server on Oak-Net external attackers deliberately confidentiality external attackers deliberately impact the confidentiality of Non Public Information (NPI) through ServerGaugeIndex Server on Oak-Net.
Risk-25 Non Public Information (NPI) ServerGaugeMonitor Server on Oak-Net external attackers deliberately confidentiality external attackers deliberately impact the confidentiality of Non Public Information (NPI) through ServerGaugeMonitor Server on Oak-Net.
Risk-26 Non Public Information (NPI) ServerGaugeSQL Server on Oak-Net external attackers deliberately confidentiality external attackers deliberately impact the confidentiality of Non Public Information (NPI) through ServerGaugeSQL Server on Oak-Net.
Risk-27 Non Public Information (NPI) DerpCorp hypervisor Server on Oak-Net external attackers deliberately confidentiality external attackers deliberately impact the confidentiality of Non Public Information (NPI) through DerpCorp hypervisor Server on Oak-Net.
Risk-28 Non Public Information (NPI) DerpCorp sysadmin jump stations on Oak-Net external attackers deliberately confidentiality external attackers deliberately impact the confidentiality of Non Public Information (NPI) through DerpCorp sysadmin jump stations on Oak-Net.
Risk-29 Non Public Information (NPI) Monitored servers on Maple-Net external attackers deliberately confidentiality external attackers deliberately impact the confidentiality of Non Public Information (NPI) through Monitored servers on Maple-Net.
Risk-30 Non Public Information (NPI) Monitored servers on Birch-Net external attackers deliberately confidentiality external attackers deliberately impact the confidentiality of Non Public Information (NPI) through Monitored servers on Birch-Net.
Risk-31 Non Public Information (NPI) Subnet Neighbors on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately availability privileged insiders (DerpCorp & Vendors) deliberately impact the availability of Non Public Information (NPI) through Subnet Neighbors on Oak-Net.
Risk-32 Non Public Information (NPI) ServerGaugeMgmt Server on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately availability privileged insiders (DerpCorp & Vendors) deliberately impact the availability of Non Public Information (NPI) through ServerGaugeMgmt Server on Oak-Net.
Risk-33 Non Public Information (NPI) ServerGaugeReport Server on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately availability privileged insiders (DerpCorp & Vendors) deliberately impact the availability of Non Public Information (NPI) through ServerGaugeReport Server on Oak-Net.
Risk-34 Non Public Information (NPI) ServerGaugeIndex Server on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately availability privileged insiders (DerpCorp & Vendors) deliberately impact the availability of Non Public Information (NPI) through ServerGaugeIndex Server on Oak-Net.
Risk-35 Non Public Information (NPI) ServerGaugeMonitor Server on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately availability privileged insiders (DerpCorp & Vendors) deliberately impact the availability of Non Public Information (NPI) through ServerGaugeMonitor Server on Oak-Net.
Risk-36 Non Public Information (NPI) ServerGaugeSQL Server on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately availability privileged insiders (DerpCorp & Vendors) deliberately impact the availability of Non Public Information (NPI) through ServerGaugeSQL Server on Oak-Net.
Risk-37 Non Public Information (NPI) DerpCorp hypervisor Server on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately availability privileged insiders (DerpCorp & Vendors) deliberately impact the availability of Non Public Information (NPI) through DerpCorp hypervisor Server on Oak-Net.
Risk-38 Non Public Information (NPI) DerpCorp sysadmin jump stations on Oak-Net privileged insiders (DerpCorp & Vendors) deliberately availability privileged insiders (DerpCorp & Vendors) deliberately impact the availability of Non Public Information (NPI) through DerpCorp sysadmin jump stations on Oak-Net.
Risk-39 Non Public Information (NPI) Monitored servers on Maple-Net privileged insiders (DerpCorp & Vendors) deliberately availability privileged insiders (DerpCorp & Vendors) deliberately impact the availability of Non Public Information (NPI) through Monitored servers on Maple-Net.
Risk-40 Non Public Information (NPI) Monitored servers on Birch-Net privileged insiders (DerpCorp & Vendors) deliberately availability privileged insiders (DerpCorp & Vendors) deliberately impact the availability of Non Public Information (NPI) through Monitored servers on Birch-Net.
Risk-41 Non Public Information (NPI) Subnet Neighbors on Oak-Net malicious software deliberately availability malicious software deliberately impact the availability of Non Public Information (NPI) through Subnet Neighbors on Oak-Net.
Risk-42 Non Public Information (NPI) ServerGaugeMgmt Server on Oak-Net malicious software deliberately availability malicious software deliberately impact the availability of Non Public Information (NPI) through ServerGaugeMgmt Server on Oak-Net.
Risk-43 Non Public Information (NPI) ServerGaugeReport Server on Oak-Net malicious software deliberately availability malicious software deliberately impact the availability of Non Public Information (NPI) through ServerGaugeReport Server on Oak-Net.
Risk-44 Non Public Information (NPI) ServerGaugeIndex Server on Oak-Net malicious software deliberately availability malicious software deliberately impact the availability of Non Public Information (NPI) through ServerGaugeIndex Server on Oak-Net.
Risk-45 Non Public Information (NPI) ServerGaugeMonitor Server on Oak-Net malicious software deliberately availability malicious software deliberately impact the availability of Non Public Information (NPI) through ServerGaugeMonitor Server on Oak-Net.
Risk-46 Non Public Information (NPI) ServerGaugeSQL Server on Oak-Net malicious software deliberately availability malicious software deliberately impact the availability of Non Public Information (NPI) through ServerGaugeSQL Server on Oak-Net.
Risk-47 Non Public Information (NPI) DerpCorp hypervisor Server on Oak-Net malicious software deliberately availability malicious software deliberately impact the availability of Non Public Information (NPI) through DerpCorp hypervisor Server on Oak-Net.
Risk-48 Non Public Information (NPI) DerpCorp sysadmin jump stations on Oak-Net malicious software deliberately availability malicious software deliberately impact the availability of Non Public Information (NPI) through DerpCorp sysadmin jump stations on Oak-Net.
Risk-49 Non Public Information (NPI) Monitored servers on Maple-Net malicious software deliberately availability malicious software deliberately impact the availability of Non Public Information (NPI) through Monitored servers on Maple-Net.
Risk-50 Non Public Information (NPI) Monitored servers on Birch-Net malicious software deliberately availability malicious software deliberately impact the availability of Non Public Information (NPI) through Monitored servers on Birch-Net.
Risk-51 Non Public Information (NPI) Subnet Neighbors on Oak-Net external attackers deliberately availability external attackers deliberately impact the availability of Non Public Information (NPI) through Subnet Neighbors on Oak-Net.
Risk-52 Non Public Information (NPI) ServerGaugeMgmt Server on Oak-Net external attackers deliberately availability external attackers deliberately impact the availability of Non Public Information (NPI) through ServerGaugeMgmt Server on Oak-Net.
Risk-53 Non Public Information (NPI) ServerGaugeReport Server on Oak-Net external attackers deliberately availability external attackers deliberately impact the availability of Non Public Information (NPI) through ServerGaugeReport Server on Oak-Net.
Risk-54 Non Public Information (NPI) ServerGaugeIndex Server on Oak-Net external attackers deliberately availability external attackers deliberately impact the availability of Non Public Information (NPI) through ServerGaugeIndex Server on Oak-Net.
Risk-55 Non Public Information (NPI) ServerGaugeMonitor Server on Oak-Net external attackers deliberately availability external attackers deliberately impact the availability of Non Public Information (NPI) through ServerGaugeMonitor Server on Oak-Net.
Risk-56 Non Public Information (NPI) ServerGaugeSQL Server on Oak-Net external attackers deliberately availability external attackers deliberately impact the availability of Non Public Information (NPI) through ServerGaugeSQL Server on Oak-Net.
Risk-57 Non Public Information (NPI) DerpCorp hypervisor Server on Oak-Net external attackers deliberately availability external attackers deliberately impact the availability of Non Public Information (NPI) through DerpCorp hypervisor Server on Oak-Net.
Risk-58 Non Public Information (NPI) DerpCorp sysadmin jump stations on Oak-Net external attackers deliberately availability external attackers deliberately impact the availability of Non Public Information (NPI) through DerpCorp sysadmin jump stations on Oak-Net.
Risk-59 Non Public Information (NPI) Monitored servers on Maple-Net external attackers deliberately availability external attackers deliberately impact the availability of Non Public Information (NPI) through Monitored servers on Maple-Net.
Risk-60 Non Public Information (NPI) Monitored servers on Birch-Net external attackers deliberately availability external attackers deliberately impact the availability of Non Public Information (NPI) through Monitored servers on Birch-Net.

180 loss scenarios were independantly considered given Plan A, B, and C controls.

ECDF


The ECDF herp derp

Density


The Density herp derp

Violin


The Violin herp derp

Swarm


The Swarm herp derp

Box


The Box herp derp

Ridge


The Ridge herp derp

Journal

Risk Model Journal

Journal of events related to this particular risk model.
Date Type Summary Detail Journaler
2020-05-22 Initialization Model initialized John Smith, Risk Analyst
2020-05-23 Delivery Report provided to CIO. John Smith, Risk Analyst
2020-05-24 Approval CIO approval of risk modeled, provided requested revisions are made and all controls of “Plan B” are implemented. John Smith, Risk Analyst
2020-05-30 Pre-approved updates CIO revisions made. John Smith, Risk Analyst
2022-05-23 Updates Model updated. John Smith, Risk Analyst
2022-05-23 Delivery Report provided to CIO. John Smith, Risk Analyst
2022-05-23 Approval CIO approval of risk modeled, provided requested revisions are made and all controls of “Plan C” are implemented. John Smith, Risk Analyst
2022-05-23 Pre-approved updates CIO Revisions Made. John Smith, Risk Analyst

Assessment Methodology

Methodology Criteria

A risk analysis should meet local, city, state, federal, and international compliance criteria and yield a corresponding risk assessment report. The criteria and objective of this analysis is as follows:

  1. To create a list of threats that the entity may become exposed to as a result of the changes presented in discussion with stakeholders.
  2. To communicate the estimated probability and impact of such threats.
  3. To create a list of controls/mitigation strategies that may reduce the probability, impact or uncertainty of the listed threats.
  4. To communicate the measure of how much the probability, impact or uncertainty of the listed threats is modified by the controls/mitigation strategies considered.
  5. To communicate the benefit of controls under consideration and costs associated with them.

Methodology Standardization & Interoperability

The taxonomy chosen is based on Open Group’s Factor Analysis of Information Risk (FAIR) standard, an open and independent information risk analysis methodology. This ensures transparency, continuity, and interoperability with other major standards.

The Open Group is an industry consortium that facilitates business objectives by developing open, vendor-neutral technology standards and certifications.The Open Group published two Open FAIR standards that form the risk taxonomy followed:

The FAIR Institute maintains publicly available documentation, resources, community events and other modes of promotion, training, and collaboration.

Deviations from Standard

The methodology used for this assessment deviates from published standards where those standards deviate from scientifically rigorous literature that meets the following criteria:

An annotated review of the scientific literature supporting each component of this methodology may be found here.

Methodology

Scope definition, estimate parameters and commentary are collected using a format comfortable to most users, a spreadsheet. A companion spreadsheet is provided with this tool which is interoperable with major spreadsheet rendering software such as Microsoft Office Excel and Google Sheets. The only variable that needs to be entered into this tool is the address or filepath to the companion spreadsheet containing the scope components, estimate parameters, and desired commentary.

companion spreadsheet opened in Google Sheets.

companion spreadsheet opened in Microsoft Excel.

Data is collected in the form of interviews, documentation review, and/or receptor-based discovery scanning in order to define the scope of the assessment. Abstractions of the components within scope are categorized into areas: Assets, Containers / Points of Attack, Agent / Threat Communities, Threat Types, and Threat Effects.

NOTICE: Each column is an independent list. i.e. the contents of rows do not relate to each other.

Scenario Building

Loss scenarios are generated by exhausting all combinations of the components identified as in scope. Implausible scenarios are removed e.g. non-malicious malware. Scenario components are strung together to form the respective scenario.

Parameter Definition

Probability and impact parameters are defined from the integration of data and calibrated subject matter experts for each of the loss scenarios. Predefined distribution parameters and/or hyper-parameters of a loss event are used where they are available and credible.

To take advantage of a person’s natural Bayesian tendencies, calibration questions and responses take the form of frequency formats instead of percentages or fractions.

Frequency formats communicate information to experts in a form that more closely resembles the natural sampling observed in animal foraging and neural networks. What is 1% in standard format would be “1 in 100” in frequency format.

Control Planning

This risk assessment tool facilitates the comparison of different combinations of controls that may reduce the probability, impact, or uncertainty of loss events. The tool calls the first theoretical combination of loss events and controls “Plan-A”. Plan-A represents the absence of any controls in order to establish a baseline or “inherent risk”. Plan-B is the second combination of controls. This is where analysts may list controls that are in place and additional controls that they are considering implementing. Plan C is where the analyst would enter an alternative set or combination of controls which require comparison.

After controls have been entered as column headers under “Controls” the check boxes are used to indicate which loss scenarios that control effects.

e.g. The “Malware scans nightly” control is an applicable control to the Threat Community entries that contain “malicious software”.

Simulation

Monte Carlo Simulation is used to generate a dataset using the parameters provided. The simulations consist of at least 10,000 variations of each loss scenario.

Analysis

The resulting approximating dataset is then analyzed using appropriate statistical methodologies.

Reporting / Communication

Background and scope may be communicated alone or alongside visuals by entering the desired text into the respective sections in the Commentary tab of the spreadsheet.

After analysis has concluded, conclusions and recommendations may also be communicated alone or alongside visuals by entering the desired text into the respective sections of the Commentary tab of the companion spreadsheet.

Col2